TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.

Slides:



Advertisements
Similar presentations
A key agreement protocol using mutual Authentication for Ad-Hoc Networks IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29.
Advertisements

A Survey of Key Management for Secure Group Communications Celia Li.
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
GridRPC Sources / Credits: IRISA/IFSIC IRISA/INRIA Thierry Priol et. al papers.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Password?. Project CLASP: Common Login and Access rights across Services Plan
An Authorization System for Grid Applications Thesis Presentation 5 th Dec 2006 Author: Wang Xiao Supervisor: Professor Heikki Hämmäinen Instructor: MSc.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Slides for Grid Computing: Techniques and Applications by Barry Wilkinson, Chapman & Hall/CRC press, © Chapter 1, pp For educational use only.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
TECHNIQUES FOR OPTIMIZING THE QUERY PERFORMANCE OF DISTRIBUTED XML DATABASE - NAHID NEGAR.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
An IPSec-based Host Architecture for Secure Internet Multicast R. Canetti, P-C. Cheng, F.Giraud, D. Pendarakis, J.R. Rao, P. Rohatgi, IBM Research D. Saha.
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area.
Decentralized key generation scheme for cellular- based heterogeneous wireless ad hoc networks ► Gupta, Ananya; Mukherjee, Anindo; Xie, Bin; Agrawal, Dharma.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Cryptography, Authentication and Digital Signatures
CYBORG Domain Independent Distributed Database Retrieval System Alok Khemka Kapil Assudani Kedar Fondekar Rahul Nabar.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Javascript Cog Kit By Zhenhua Guo. Grid Applications Currently, most grid related applications are written as separate software. –server side: Globus,
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
CIST/ETRI/ISIT/KDDI/Kyusyu Univ./NICT Joint Research Workshop on Ubiquitous Network Security 2005 Verifier-Based Password-Authenticated Key Exchange Jeong.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
Paper Review: On communication Security in Wireless Ad-Hoc Sensor Networks By Toni Farley.
Scalable Grid system– VDHA_Grid: an e-Science Grid with virtual and dynamic hierarchical architecture Huang Lican College of Computer.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Group Key Distribution Xiuzhen Cheng The George Washington University.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
An Adaptive Protocol for Efficient & Secure Multicasting in Wireless LANS Sandeep Gupta & Sriram Cherukuri Arizona State University
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Zueyong Zhu† and J. William Atwood‡
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Majid Alshammari and Khaled Elleithy
Design and Implementation of SUPnP Networks
InfoShare A Distributed P2P Information Storage & Retrieval System
Presentation transcript:

TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering

CONTENTS Introduction Work Done Problem Definition Existing System Proposed Methodology Feasibility Analysis and System Requirements Scope Results Literature Survey Publications References Conclusion Timeline Chart

INTRODUCTION Grid computing involves the formation of dynamic virtual organizations including groups of individuals as well as associated resources where security is an important criteria. Proposed methodology mainly aims to provide more security based on trigon based authentication and authorization and then distribution of channels with key take place by hash algorithm using GLOBUS as middleware In the distributed channel users join and communicate with other group members using this key. Provides Secure communication and dynamic groups.

WORK DONE KEY DISTRIBUTION Whenever a user join the keys are generated dynamically and encoded using MD5 and each member communicates with the other group members using this key. TRIGON BASED AUTHENTICATION P roposed a dual trigon based authentication, which will authenticate the user by a combined mechanism of two files, namely, authentication file and backend file and then allows the user to authorize the resources.

PROBLEM DEFINITION Taking the security as the main constraint in grid computing environment, we are proposing a trigon based authentication and authorization, and then distribution of channels by MD5 algorithm to reduce computational load using GLOBUS as middleware.

EXISTING SYSTEM Separate authentication and authorization protocol is used. Key Distribution is slow. No forward/backward secrecy. computational cost high – ‘n’ encryption and ‘n’ unicast

PROPOSED METHODOLOGY Trigon based authentication and authorization is used to maintain strong security by splitting the password and storing in two files. Distribution of channels by MD5 algorithm MODULES 1.Authentication 2.Authorisation 3.Distribution of Channels 4.File transfer 5.Formation of Virtual Organization

TRIGON BASED AUTHENTICATION ALGORITHM REGISTRATION User registers with username and password Authentication file generates the three sides of the trigon a, a’ and a’’ Determines variance and the product of the sides Vaa’ and Paa’ where Vaa’=a-a’ Paa’ = a * a’ Save α and username in authentication file and forwards username, Vaa’ and Paa’ to Backend file where Backend file saves Vaa’ and Paa' for the corresponding username

REGISTRATION – FLOW DIAGRAM

Contd … AUTHENTICATION User Login P AI is the ASCII-interpreted value of the given password Calculate pi and AI(i) where P AI(i) / 10 pow n-2 ; if P AI (i) ≥ 180 Pi = { P AI(i)/ 10 pow n-3 ; else AI(i) = Pi/2; Authentication file sends αi and username to backend file Backend File determines AT(i) and sends to authentication file where AT(i) = αi + Vaa’i 2Paa‘i If Sin AI(i) = ( 1- ATi / 2 ) ½ then token is issued for authorization

FLOW DIAGRAM - AUTHENTICATION

FEASIBILITY ANALYSIS AND SYSTEM REQUIREMENTS The methods used here utilized the fundamental properties of the trigon and the trigon parameters, made the grid more secure as the alienated passwords had been derived from these trigon parameters Key distribution using hash function provides more security Operating system - Linux RHEL5 Programming language - Java

SCOPE The implementation of dual authentication method provide effective performance, security and paying the way to valid users for access with the VO for resource sharing such as efficient computational channel distribution with help of MD5 algorithm Forward/backward Secrecy maintained. Reduction of computation and communication cost. Dynamic rekey operations and no need of resources. Highly scalable Online chat groups

RESULTS 1.Usernames, Passwords and the trigon parameters based on the user passwords provided at the time of registration

2. The authentication parameters derived from the trigon parameters, the authentication code status and the outcome obtained from authentication of the user.

3. Number of Nodes and Distribution Time in seconds

4.Graph-Number of nodes Vs Distribution time in seconds

5.SAMPLE OUTPUT eff3.stdout User Name : sud Password : sudhi Alpha : E10 Vp : Pp : E11 Token is : Pi : Authentication token User Token : RegToken : Valid User file length: 2 hash: e44fea3bec53bcea3b7513ccef5857ac New channel discovered cse

JOB SUBMISSION

LITERATURE SURVEY  An Computation-Efficient Multicast Key Distribution.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees - Centralized Hierarchical Methods - One-way function trees  A Simple User Authentication Scheme for Grid Computing  A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

PUBLICATIONS AUTHENTICATION PUBLICATION "International Journal of Computer Science and Information Security" Dec 2009, vol 6, pp ( ). Accepted in National level Conference (NCSSS) in BIT.

REFERENCES 1.Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang, "A Simple User Authentication Scheme for Grid Computing, International Journal of Network Security, vol.7, no.2, Pp.202–206, September J. Crampton, H.W.Lim, K.G.Paterson and G.Price, "A Certificate- Free Grid Security Infrastructure Supporting Password-Based User Authentication" In Proceedings of the 6th Annual PKI R&D Workshop 2007, pp , Gaithersburg, Maryland, USA, Computation-Efficient Multicast Key Distribution -Lihao Xu, Senior Member, IEEE, and Cheng Huang, Member, ieee transactions on parallel and distributed systems, vol. 19, no. 5, may Key Establishment in Large Dynamic Groups Using One-Way Function Trees -Alan T. Sherman and David A. McGrew, Member, ieee transactions on software engineering, vol. 29, no. 5, may 2003

CONCLUSION The implementation of our dual authentication protocol showed its effective performance in pinpointing the adversaries and paying the way to valid users for access with the VO for resource sharing such as efficient computational channel distribution with help of MD5 algorithm. So the utilization of this scheme will make the grid environment more secure

TIMELINE CHART Jan Feb-March Trigon based authentication Trigon based authorization and distribution of channels TIME MODULESMODULES April-May 2010 File Transformation and Formation of Virtual Organization

THANK YOU